CVE-2025-51958
Published: 30 January 2026
Description
aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection flaw in the runcommand plugin's postaction.php, preventing exploitation of CVE-2025-51958.
Validates and sanitizes inputs to the postaction.php endpoint to block malicious OS command injection payloads.
Prohibits use of the unsupported 2014-04-01 runcommand plugin, eliminating exposure to this vulnerability.
Security SummaryAI
CVE-2025-51958 is a critical vulnerability in the aelsantex runcommand plugin version 2014-04-01 for DokuWiki, enabling unauthenticated attackers to execute arbitrary system commands. The flaw resides in the lib/plugins/runcommand/postaction.php file and is classified as CWE-78 (OS Command Injection). It received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for remote exploitation without privileges or user interaction.
Any unauthenticated attacker with network access to a vulnerable DokuWiki instance running this plugin can exploit the issue remotely. Exploitation involves sending crafted requests to the postaction.php endpoint, resulting in arbitrary command execution on the underlying server with the privileges of the web server process. This grants attackers high-impact control over confidentiality, integrity, and availability, potentially leading to full system compromise.
Advisories and related resources are available at https://gist.github.com/NtustLin/f64528002e4f61874045799127dc49a4, https://github.com/aelsantex/runcommand, and https://www.dokuwiki.org/plugin:runcommand, which provide further technical details on the plugin and vulnerability.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated OS command injection in a public-facing DokuWiki web plugin, directly enabling T1190: Exploit Public-Facing Application for remote code execution.